Upload
others
View
5
Download
0
Embed Size (px)
Citation preview
User Manual
WISE-6610 Series
Indsutrial LoRaWAN Gateway
CopyrightThe documentation and the software included with this product are copyrighted 2018by Advantech Co., Ltd. All rights are reserved. Advantech Co., Ltd. reserves the rightto make improvements in the products described in this manual at any time withoutnotice. No part of this manual may be reproduced, copied, translated or transmittedin any form or by any means without the prior written permission of Advantech Co.,Ltd. Information provided in this manual is intended to be accurate and reliable. How-ever, Advantech Co., Ltd. assumes no responsibility for its use, nor for any infringe-ments of the rights of third parties, which may result from its use.
AcknowledgementsIntel and Pentium are trademarks of Intel Corporation.Microsoft Windows and MS-DOS are registered trademarks of Microsoft Corp.All other product names or trademarks are properties of their respective owners.
Product Warranty (3 years)Advantech warrants to you, the original purchaser, that each of its products will befree from defects in materials and workmanship for three years from the date of pur-chase.This warranty does not apply to any products which have been repaired or altered bypersons other than repair personnel authorized by Advantech, or which have beensubject to misuse, abuse, accident or improper installation. Advantech assumes noliability under the terms of this warranty as a consequence of such events.Because of Advantech’s high quality-control standards and rigorous testing, most ofour customers never need to use our repair service. If an Advantech product is defec-tive, it will be repaired or replaced at no charge during the warranty period. For out of-warranty repairs, you will be billed according to the cost of replacement materials,service time and freight. Please consult your dealer for more details.If you think you have a defective product, follow these steps:1. Collect all the information about the problem encountered. (For example, CPU
speed, Advantech products used, other hardware and software used, etc.) Note anything abnormal and list any on screen messages you get when the problem occurs.
2. Call your dealer and describe the problem. Please have your manual, product, and any helpful information readily available.
3. If your product is diagnosed as defective, obtain an RMA (return merchandize authorization) number from your dealer. This allows us to process your return more quickly.
4. Carefully pack the defective product, a fully-completed Repair and Replacement Order Card and a photocopy proof of purchase date (such as your sales receipt) in a shippable container. A product returned without proof of the purchase date is not eligible for warranty service.
5. Write the RMA number visibly on the outside of the package and ship it prepaid to your dealer.
Part No. XXXXXXXXXX Edition 1Printed in Taiwan November 2018
WISE-6610 Series User Manual ii
This product has passed the CE test for environmental specifications. Test conditionsfor passing included the equipment being operated within an industrial enclosure. Inorder to protect the product from being damaged by ESD (Electrostatic Discharge)and EMI leakage, we strongly recommend the use of CE-compliant industrial enclo-sure products.
FCC Class A
Note: This equipment has been tested and found to comply with the limits for a ClassA digital device, pursuant to part 15 of the FCC Rules. These limits are designed toprovide reasonable protection against harmful interference when the equipment isoperated in a commercial environment. This equipment generates, uses, and canradiate radio frequency energy and, if not installed and used in accordance with theinstruction manual, may cause harmful interference to radio communications. Opera-tion of this equipment in a residential area is likely to cause harmful interference inwhich case the user will be required to correct the interference at his own expense.
Technical Support and Assistance1. Visit the Advantech web site at www.advantech.com/support where you can find
the latest information about the product.2. Contact your distributor, sales representative, or Advantech's customer service
center for technical support if you need additional assistance. Please have the following information ready before you call:– Product name and serial number– Description of your peripheral attachments– Description of your software (operating system, version, application software,
etc.)– A complete description of the problem– The exact wording of any error messages
iii WISE-6610 Series User Manual
Warnings, Cautions and Notes
Document FeedbackTo assist us in making improvements to this manual, we would welcome commentsand constructive criticism. Please send all such - in writing to: [email protected]
Packing ListBefore setting up the system, check that the items listed below are included and ingood condition. If any item does not accord with the table, please contact your dealerimmediately. 1 x Indsutrial LoRa private gateway 1 x DIN-Rail mounting bracket and screws 1 x Wall-mounting bracket
Warning! Warnings indicate conditions, which if not observed, can cause personal injury!
Caution! Cautions are included to help you avoid damaging hardware or losing data. e.g.There is a danger of a new battery exploding if it is incorrectly installed. Do not attempt to recharge, force open, or heat the battery. Replace the battery only with the same or equivalent type recommended by the man-ufacturer. Discard used batteries according to the manufacturer's instructions.
Note! Notes provide optional additional information.
WISE-6610 Series User Manual iv
cloth. Do not use liquid or spray detergents for cleaning. For plug-in equipment, the power outlet socket must be located near the equip-
ment and must be easily accessible. Keep this equipment away from humidity. Put this equipment on a reliable surface during installation. Dropping it or letting
it fall may cause damage. The openings on the enclosure are for air convection. Protect the equipment
from overheating. DO NOT COVER THE OPENINGS. Make sure the voltage of the power source is correct before connecting the
equipment to the power outlet. Position the power cord so that people cannot step on it. Do not place anything
over the power cord. All cautions and warnings on the equipment should be noted. If the equipment is not used for a long time, disconnect it from the power source
to avoid damage by transient overvoltage. Never pour any liquid into an opening. This may cause fire or electrical shock. Never open the equipment. For safety reasons, the equipment should be
opened only by qualified service personnel. If one of the following situations arises, get the equipment checked by service
personnel:– The power cord or plug is damaged.– Liquid has penetrated into the equipment.– The equipment has been exposed to moisture.– The equipment does not work well, or you cannot get it to work according to
the user's manual.– The equipment has been dropped and damaged.– The equipment has obvious signs of breakage.
DO NOT LEAVE THIS EQUIPMENT IN AN ENVIRONMENT WHERE THE STORAGE TEMPERATURE MAY GO -40°C (-40°F) ~ 85°C (185°F). THIS COULD DAMAGE THE EQUIPMENT. THE EQUIPMENT SHOULD BE IN A CONTROLLED ENVIRONMENT.
The sound pressure level at the operator's position according to IEC 704-1:1982 is no more than 70 dB (A).DISCLAIMER: This set of instructions is given according to IEC 704-1. Advan-tech disclaims all responsibility for the accuracy of any statements containedherein.
v WISE-6610 Series User Manual
Wichtige Sicherheishinweise Bitte lesen sie Sich diese Hinweise sorgfältig durch. Heben Sie diese Anleitung für den späteren Gebrauch auf. Vor jedem Reinigen ist das Gerät vom Stromnetz zu trennen. Verwenden Sie
Keine Flüssig-oder Aerosolreiniger. Am besten dient ein angefeuchtetes Tuch zur Reinigung.
Die NetzanschluBsteckdose soll nahe dem Gerät angebracht und leicht zugän-glich sein.
Das Gerät ist vor Feuchtigkeit zu schützen. Bei der Aufstellung des Gerätes ist auf sicheren Stand zu achten. Ein Kippen
oder Fallen könnte Verletzungen hervorrufen. Die Belüftungsöffnungen dienen zur Luftzirkulation die das Gerät vor überhit-
zung schützt. Sorgen Sie dafür, daB diese Öffnungen nicht abgedeckt werden. Beachten Sie beim. AnschluB an das Stromnetz die AnschluBwerte. Verlegen Sie die NetzanschluBleitung so, daB niemand darüber fallen kann. Es
sollte auch nichts auf der Leitung abgestellt werden. Alle Hinweise und Warnungen die sich am Geräten befinden sind zu beachten. Wird das Gerät über einen längeren Zeitraum nicht benutzt, sollten Sie es vom
Stromnetz trennen. Somit wird im Falle einer Überspannung eine Beschädigung vermieden.
Durch die Lüftungsöffnungen dürfen niemals Gegenstände oder Flüssigkeiten in das Gerät gelangen. Dies könnte einen Brand bzw. elektrischen Schlag aus-lösen.
Öffnen Sie niemals das Gerät. Das Gerät darf aus Gründen der elektrischen Sicherheit nur von authorisiertem Servicepersonal geöffnet werden.
Wenn folgende Situationen auftreten ist das Gerät vom Stromnetz zu trennen und von einer qualifizierten Servicestelle zu überprüfen:– Netzkabel oder Netzstecker sind beschädigt.– Flüssigkeit ist in das Gerät eingedrungen.– Das Gerät war Feuchtigkeit ausgesetzt.– Wenn das Gerät nicht der Bedienungsanleitung entsprechend funktioniert
oder Sie mit Hilfe dieser Anleitung keine Verbesserung erzielen.– Das Gerät ist gefallen und/oder das Gehäuse ist beschädigt.– Wenn das Gerät deutliche Anzeichen eines Defektes aufweist.
Der arbeitsplatzbezogene Schalldruckpegel nach DIN 45 635 Teil 1000 beträgt 70dB(A) oder weiger.Haftungsausschluss: Die Bedienungsanleitungen wurden entsprechend derIEC-704-1 erstellt. Advantech lehnt jegliche Verantwortung für die Richtigkeitder in diesem Zusammenhang getätigten Aussagen ab.
WISE-6610 Series User Manual vi
the device before servicing the device. Avoid nylon gloves or work clothes, which tend to build up a charge.
Always disconnect the power from the device before servicing it. Before plugging a cable into any port, discharge the voltage stored on the cable
by touching the electrical contacts to the ground surface.
vii WISE-6610 Series User Manual
ContentsChapter 1 Product Overview ............................... 1
1.1 Specifications............................................................................................ 21.2 Hardware Views........................................................................................ 3
1.2.1 Front View..................................................................................... 31.2.2 Rear View ..................................................................................... 31.2.3 Top View....................................................................................... 31.2.4 System LED Panel........................................................................ 4
1.3 Dimensions ............................................................................................... 4
Chapter 2 Gateway Installation ........................... 52.1 Warning..................................................................................................... 62.2 Installation Guideline................................................................................. 72.3 Installing the Gateway............................................................................... 8
2.3.1 Installing Antenna ......................................................................... 82.3.2 Wall Mounting ............................................................................... 92.3.3 DIN Rain Mounting ..................................................................... 10
2.4 Connecting the Gateway to Ethernet Port .............................................. 122.4.1 RJ45 Ethernet Cable Wiring ....................................................... 12
2.5 Power Supply Installation........................................................................ 12
Chapter 3 Managing Gateway ........................... 133.1 Access Interface ..................................................................................... 143.2 Recommended Practices........................................................................ 15
3.2.1 Changing Default Password ....................................................... 153.3 Status...................................................................................................... 16
3.3.1 General ....................................................................................... 163.3.2 Network....................................................................................... 173.3.3 DHCP.......................................................................................... 173.3.4 IPsec........................................................................................... 183.3.5 DynDNS...................................................................................... 183.3.6 System Log................................................................................. 19
3.4 Configuration........................................................................................... 203.4.1 LAN............................................................................................. 203.4.2 NAT............................................................................................. 283.4.3 OpenVPN.................................................................................... 323.4.4 IPSec .......................................................................................... 353.4.5 GRE............................................................................................ 393.4.6 L2TP ........................................................................................... 413.4.7 PPTP .......................................................................................... 433.4.8 Services ...................................................................................... 443.4.9 Scripts......................................................................................... 523.4.10 Automatic Update ....................................................................... 54
3.5 Customization ......................................................................................... 563.5.1 Adding a Module......................................................................... 56
3.6 Administration ......................................................................................... 633.6.1 Users .......................................................................................... 633.6.2 Change Profile ............................................................................ 643.6.3 Change Password ...................................................................... 643.6.4 Set Real Time Clock ................................................................... 653.6.5 Backup Configuration ................................................................. 653.6.6 Restore Configuration................................................................. 65
SmartSwarm 243 User Manual viii
3.6.7 Update Firmware ........................................................................ 663.6.8 Reboot ........................................................................................ 67
Chapter 4 Configuration in Typical Situations ...........................................68
4.1 Enabling the LoRaWAN and Network Server ......................................... 694.2 Changing the Raw LoRa Data Format .................................................... 864.3 Node-RED Setup .................................................................................... 88
ix SmartSwarm 243 User Manual
List of FiguresFigure 1.1 Front View ..................................................................................................................... 3Figure 1.2 Rear View...................................................................................................................... 3Figure 1.3 Top View ....................................................................................................................... 3Figure 1.4 System LED Panel ........................................................................................................ 4Figure 2.1 Installing the Antenna.................................................................................................... 8Figure 2.2 Positioning the Antenna ................................................................................................ 8Figure 2.3 Wall Mount Installation .................................................................................................. 9Figure 2.4 Wall Mount Installation ................................................................................................ 10Figure 2.5 Installing the DIN-Rail Mounting Kit............................................................................. 10Figure 2.6 Correctly Installed DIN Rail Kit .................................................................................... 11Figure 2.7 Removing the DIN-Rail................................................................................................ 11Figure 2.8 Ethernet Plug & Connector Pin Position...................................................................... 12Figure 2.9 Installing the Power Cable........................................................................................... 12Figure 3.1 Login Screen ............................................................................................................... 14Figure 3.2 Changing a Default Password..................................................................................... 15Figure 3.3 Status > General ......................................................................................................... 16Figure 3.4 Status > Network......................................................................................................... 17Figure 3.5 Status > DHCP............................................................................................................ 17Figure 3.6 Status > IPsec ............................................................................................................. 18Figure 3.7 Status > DynDNS ........................................................................................................ 18Figure 3.8 Status > System Log ................................................................................................... 19Figure 3.9 Example Program Syslogd Start with the Parameter -R ............................................. 19Figure 3.10 Configuration > LAN.................................................................................................... 21Figure 3.11 IPv6 Address with Prefix Example .............................................................................. 23Figure 3.12 IPv4 Dynamic DHCP Network Topology ..................................................................... 24Figure 3.13 LAN Configuration for a Dynamic Network Typology .................................................. 25Figure 3.14 IPv4 Dynamic and Static DHCP Network Topology .................................................... 25Figure 3.15 LAN Configuration for an IPv4 Dynamic and Static DHCP Network Topology ........... 26Figure 3.16 IPv6 Dynamic DHCP Server Network Topology ......................................................... 26Figure 3.17 LAN Configuration for an IPv6 Dynamic DHCP Server Network Topology................. 27Figure 3.18 Configuration > NAT.................................................................................................... 28Figure 3.19 Topology for NAT Configuration Example 1................................................................ 30Figure 3.20 NAT Configuration for Example 1................................................................................ 30Figure 3.21 Topology for NAT Configuration Example 2................................................................ 31Figure 3.22 NAT Configuration for Example 2................................................................................ 31Figure 3.23 Configuration > OpenVPN > 1st Tunnel...................................................................... 32Figure 3.24 Topology of OpenVPN Configuration Example ........................................................... 34Figure 3.25 Configuration > 1st Tunnel .......................................................................................... 36Figure 3.26 Topology of Configuration Example ............................................................................ 39Figure 3.27 Configuration > GRE > 1st Tunnel .............................................................................. 40Figure 3.28 Topology of GRE Tunnel Configuration Example ....................................................... 41Figure 3.29 Configuration > L2TP .................................................................................................. 42Figure 3.30 Topology of L2TP Tunnel Configuration Example....................................................... 42Figure 3.31 Configuration > PPTP ................................................................................................. 43Figure 3.32 Topology of PPTP Tunnel Configuration Example...................................................... 44Figure 3.33 Configuration > Services > DynDNS ........................................................................... 45Figure 3.34 DynDNS Configuration Example ................................................................................. 45Figure 3.35 Configuration > Services > HTTP................................................................................ 46Figure 3.36 Configuration > Services > NTP.................................................................................. 46Figure 3.37 Example of NTP Configuration.................................................................................... 47Figure 3.38 Configuration > Services > SNMP............................................................................... 47Figure 3.39 OID Basic Structure..................................................................................................... 49Figure 3.40 SNMP Configuration Example..................................................................................... 50Figure 3.41 MIB Browser Example................................................................................................. 50Figure 3.42 Configuration > Services > SMTP ............................................................................... 51Figure 3.43 SMTP Client Configuration Example........................................................................... 51
SmartSwarm 243 User Manual x
Figure 3.44 Configuration > Services > SSH.................................................................................. 52Figure 3.45 Example of a Startup Script......................................................................................... 53Figure 3.46 Example of IPv6 Up/Down Script ................................................................................ 54Figure 3.47 Configuration > Automatic Update............................................................................... 55Figure 3.48 Example of Automatic Update 1 .................................................................................. 56Figure 3.49 Example of Automatic Update 2 .................................................................................. 56Figure 3.50 User Modules .............................................................................................................. 57Figure 3.51 User Modules > LoRaWAN Gateway > MQTT and LoRaWAN................................... 58Figure 3.52 User Modules > LoRaWAN Gateway > LoRaWAN Status.......................................... 60Figure 3.53 User Modules > LoRaWAN Gateway > LoRaWAN Server ......................................... 61Figure 3.54 User Modules > LoRaWAN Gateway > LoRaWAN Server (https) .............................. 62Figure 3.55 User Modules > LoRaWAN Gateway > Advantech Application .................................. 62Figure 3.56 Administration > Users ................................................................................................ 63Figure 3.57 Administration > Change Profile .................................................................................. 64Figure 3.58 Administration > Change Password ............................................................................ 64Figure 3.59 Administration > Set Real Time Clock ......................................................................... 65Figure 3.60 Administration > Restore Configuration....................................................................... 65Figure 3.61 Administration > Update Firmware .............................................................................. 66Figure 3.62 Administration > Reboot .............................................................................................. 67Figure 4.1 Customization > User Modules.................................................................................... 69Figure 4.2 LoRaWAN Gateway > MQTT and LoRaWAN ............................................................. 69Figure 4.3 LoRaWAN Gateway > MQTT and LoRaWAN ............................................................. 70Figure 4.4 LoRaWAN Gateway > LoRaWAN Server.................................................................... 71Figure 4.5 LoRaWAN Server > Infrastructure > Gateways........................................................... 71Figure 4.6 LoRaWAN Server > Infrastructure > Gateways > Create............................................ 72Figure 4.7 LoRaWAN Server > Infrastructure > Networks............................................................ 72Figure 4.8 LoRaWAN Server > Infrastructure > Network > Create > General.............................. 73Figure 4.9 LoRaWAN Server > Infrastructure > Network > Create > ADR................................... 74Figure 4.10 LoRaWAN Server > Infrastructure > Network > Create > Channel ............................. 75Figure 4.11 LoRaWAN Server > Backends > Handlers.................................................................. 76Figure 4.12 LoRaWAN Server > Backends > Handlers > Create................................................... 77Figure 4.13 Parse Uplink Sample ................................................................................................... 78Figure 4.14 LoRaWAN Server > Backends > Connectors.............................................................. 78Figure 4.15 LoRaWAN Server > Backends > Connectors > Create............................................... 79Figure 4.16 LoRaWAN Server > Devices > Profiles ....................................................................... 80Figure 4.17 LoRaWAN Server > Devices > Profiles > Create > General ....................................... 80Figure 4.18 LoRaWAN Server > Devices > Profiles > Create > ADR ............................................ 81Figure 4.19 LoRaWAN Server > Devices > Activated (Nodes) ...................................................... 82Figure 4.20 LoRaWAN Server > Devices > Activated (Nodes) > Create........................................ 82Figure 4.21 LoRaWAN Server > Devices > Commissioned ........................................................... 83Figure 4.22 LoRaWAN Server > Devices > Commissioned > Create ............................................ 83Figure 4.23 LoRaWAN Server > Received Frames........................................................................ 84Figure 4.24 MQTT Subscription...................................................................................................... 84Figure 4.25 MQTT Subscription...................................................................................................... 85Figure 4.26 LoRaWAN Server > Infrastructure > Events................................................................ 85Figure 4.27 User Modules > LoRaWAN Gateway > Advantech Application .................................. 86Figure 4.28 Data and Status........................................................................................................... 86Figure 4.29 User Modules > LoRaWAN Gateway > MQTT and LoRaWAN................................... 87Figure 4.30 LoRaWAN Server > Activated (Nodes) ....................................................................... 87Figure 4.31 LoRaWAN Server > Activated (Nodes) > Edit > General ............................................ 87Figure 4.32 Applying Data to Other Software Applications............................................................. 88Figure 4.33 Customization > User Modules.................................................................................... 88Figure 4.34 Node-RED ................................................................................................................... 88Figure 4.35 Node-RED ................................................................................................................... 88
xi SmartSwarm 243 User Manual
Chapter 1
1Product Overview
Frequency 868/915 MHzANT Connector RP-SMA Female connector x 1
LAN Interface Ethernet 10/100 Mbps, auto MDI/MDIXConnector RJ45 x 1Protection 1.5-kV built-in magnetic isolation protection
Digital I/O Port Type Digital input on voltage: 2.7 ~ 36 VDCPort Connector 4-way Molex moni-fit connector
General LED Indicators PWR, DAT, WAN, ETHReboot Trigger Reset button
Physical Protection Class IP30Installation DIN rail, wallDimensions (W x H x D)
150 x 37.5 x 83 mm (5.9" x 1.48" x 3.27")
Weight 500 g ( 17.63 oz)Environment Operating
Temperature-40 ~ 75°C (-40 ~ 167°F)
Storage Temperature
-40 ~ 85°C (-40 ~ 185°F)
Ambient Relative Humidity
10 ~ 95% (non-condensing)
Power Power Input 9 ~ 36 VDCPower Connector 4-way Molex moni-fit connectorPower Consumption
3.1/6.6/40 mW (average/peak/sleep mode)
Certifications EMC EN61000-4-2, Level 3 EN61000-4-3, Level 3 EN61000-4-4, Level 3 EN61000-4-5, Level 3 EN61000-4-6, Level 3 EN61000-4-12, Level 3 EN61000-4-11, voltage dip: 70%
Shock IEC60068-2-27Free Fall IEC60068-2-32Vibration IEC60068-2-6
2 WISE-6610 Series User Manual
1.2 Hardware Views
1.2.1 Front View
Figure 1.1 Front View
1.2.2 Rear View
Figure 1.2 Rear View
1.2.3 Top View
Figure 1.3 Top View
No. Item Description1 System LED panel See “System LED Panel” on page 4 for further details.2 I/O (Power socket) Connect cabling for power.3 ETH port RJ45 x 14 Antenna connector Connector for antenna.
LoRaETH+-
PWR
DAT
WANWISE-6610I / O
3 421
No. Item Description1 DIN-Rail holes Screw holes (2) used in the installation of a DIN rail clip.
1
No. Item Description1 Wall mounting holes Screw holes (4) used in the installation on wall.
1
1
1
1
WISE-6610 Series User Manual 3
1.3 Dimensions
Figure 1.4 System LED Panel
LED Name LED Color DescriptionPWR GreenDAT GreenWAN Green
37.
50 [1
.47]
125.40 [4.94]
140 [5.51] 150 [5.90]
83
[3.2
6]
7.5
0 [0
.30]
I / O
mm [inch]
4 WISE-6610 Series User Manual
Chapter 2
2Gateway Installation
Caution! Exposure to chemicals can degrade the sealing properties of materials used in the sealed relay device.
Caution! It is not recommended to work on the system or connect or disconnect cables during periods of lightning activity.
Caution! Before performing any of the following procedures, disconnect the power source from the DC circuit.
Caution! Read the installation instructions before connecting the system to its power source.
Caution! The device must be grounded. Never defeat the ground conductor or operate the equipment in the absence of a suitably installed ground con-ductor.
Caution! The installation, replacement, or service of the device must be Only be performed by trained and qualified personnel.
Caution! Ultimate disposal of this product should be handled according to local and national regulations
6 WISE-6610 Series User Manual
2.2 Installation GuidelineThe following guidelines are provided to optimize the device performance. Reviewthe guidelines before installing the device. Make sure cabling is away from sources of electrical noise. Radios, power lines,
and fluorescent lighting fixtures can interference with the device performance. Make sure the cabling is positioned away from equipment that can damage the
cables. Operating environment is within the ranges listed range, see “Specifications” on
page 2. Relative humidity around the switch does not exceed 95 percent (noncondens-
ing). Altitude at the installation site is not higher than 10,000 feet. In 10/100 and 10/100/1000 fixed port devices, the cable length from the switch
to connected devices can not exceed 100 meters (328 feet). Make sure airflow around the switch and respective vents is unrestricted. With-
out proper airflow the switch can overheat. To prevent performance degredation and damage to the switch, make sure there is clerance at the top and bottom and around the exhaust vents.
Caution! To prevent the system from overheating, do not operate it in an area that exceeds the maximum recommended ambient temperature of: 70°C (158°F).
Caution! If the switch is to be installed in a hazardous location, ensure that the DC power source is located away from the vicinity of the switch.
Caution! The installation of the equipment must comply with all national and local electrical codes.
Caution! Explosion Hazard-The area must be known to be nonhazardous before servicing or replacing any components.
Warning! Airflow around the switch must be unrestricted. To prevent the switch from overheating, there must be the following minimum clearances: Top and bottom: 2.0 in. (50.8 mm) Sides: 2.0 in. (50.8 mm) Front: 2.0 in. (50.8 mm)
WISE-6610 Series User Manual 7
1. Connect the antenna by screwing the antenna connectors in a clockwise direc-tion.
Figure 2.1 Installing the Antenna2. Position the antenna for optimal signal strength.
Figure 2.2 Positioning the Antenna
Note! The location and position of the antenna is crucial for effective wireless connectivity
LoRa
ETH
+-PW
RDAT
I / O
WAN
WISE-66
10
LoRa
ETH
+-PW
RDAT
I / O
WAN
WISE-66
10
8 WISE-6610 Series User Manual
2.3.2 Wall Mounting1. Locate the area to install and mark the four screw locations. It is suggested to
place the device on the installation location and use the mounting locations to mark the location of the screw holes).
2. If necessary first drill pilot holes. Drill four holes over the four marked locations on the wall. On concrete, it is recommended to install wall sinks
3. Align the SmartSwarm over the installation location on the wall.4. Secure the SmartSwarm with screws (Ø 5.0 mm).
Figure 2.3 Wall Mount Installation
LoRaETH
+-
PWR DAT
I / OWAN
WISE-6610
WISE-6610 Series User Manual 9
1. Align the DIN rail clip with the rear of SmartSwarm.2. Secure the DIN rail clip and the SmartSwarm with screws.
Figure 2.4 Wall Mount Installation3. Position the rear panel of the SmartSwarm directly in front of the DIN rail, mak-
ing sure that the top of the DIN rail clip hooks over the top of the DIN rail, as shown in the following illustration.Make sure the DIN rail is inserted behind the spring mechanism.
4. Once the DIN rail is seated correctly in the DIN rail clip, press the front of the SmartSwarm to rotate the SmartSwarm down and into the release tab on the DIN rail clip. If seated correctly, the bottom of the DIN rail should be fully inserted in the release tab.
Figure 2.5 Installing the DIN-Rail Mounting Kit
DIN rail clip
DIN rail
DIN rail clip release tab
10 WISE-6610 Series User Manual
See the following figure demonstrating the correct position of a completed DINinstallation.
Figure 2.6 Correctly Installed DIN Rail Kit
2.3.3.2 Removing the DIN Rail Mounting Kit1. Ensure that power is removed from the SmartSwarm, and disconnect all cables
and connectors from the front panel of the SmartSwarm.2. Push down on the top of the DIN rail clip release tab with your finger. As the clip
releases, lift the bottom of the SmartSwarm, as shown in the following illustra-tion.
Figure 2.7 Removing the DIN-Rail
WISE-6610 Series User Manual 11
For RJ45 connectors, data-quality, twisted pair cabling (rated CAT5 or better) is rec-ommended. The connector bodies on the RJ45 Ethernet ports are metallic and con-nected to the GND terminal. For best performance, use shielded cabling. Shieldedcabling may be used to provide further protection.
Figure 2.8 Ethernet Plug & Connector Pin PositionMaximum cable length: 100 meters (328 ft.) for 10/100BaseT.
2.5 Power Supply Installation1. Insert the power cable into the power socket. The cable locks in place if installed
correctly.2. Connect the other end to a wall outlet.
The LEDs light when the device is connected to the power source
Figure 2.9 Installing the Power CableThe following table show the color lines definition:
Straight-thru Cable Wiring Cross-over Cable WiringPin 1 Pin 1 Pin 1 Pin 3Pin 2 Pin 2 Pin 2 Pin 6Pin 3 Pin 3 Pin 3 Pin 1Pin 6 Pin 6 Pin 6 Pin 2
1
8
V+ DI GND D0Red Yellow Black Gray
LoRa
ETH
+-PWR
DAT
I / O
WAN
WISE-66
10
12 WISE-6610 Series User Manual
Chapter 3
3Managing Gateway
login screen displays.3. Enter the default user name and password (root/root) to log into the
management interface. You can change the default password after a successfully log in. See “Changing Default Password” on page 15.
4. Click Login to enter the management interface.
Figure 3.1 Login ScreenWhen you successfully enter login information on the login page, web interface willbe displayed. The left side of the web interface contains a menu tree with sections formonitoring (Status), configuration (Configuration), customization (Customization) andadministration (Administration) of the device.Name and Location items in the right upper corner display the name and location ofthe device in the SNMP configuration (see “SNMP” on page 47). These fields areuser-defined for each device.After the green LED starts to blink you may restore the initial device settings bypressing the reset (RST) button on the back panel. If the reset button is pressed, allconfiguration will revert to factory defaults and the device will reboot (the green LEDwill be on during the reboot).
14 WISE-6610 Series User Manual
3.2 Recommended PracticesOne of the easiest things to do to help increase the security posture of the networkinfrastructure is to implement a policy and standard for secure management. Thispractice is an easy way to maintain a healthy and secure network.After you have performed the basic configurations on your switches, the following is arecommendation which is considered best practice policy.
3.2.1 Changing Default PasswordIn keeping with good management and security practices, it is recommended thatyou change the default password as soon as the WISE-6610 Series is functioningand setup correctly. The following details the necessary steps to change the defaultpassword.To change the password:1. Navigate to Administration > Change Password.2. In the New Password field, type in the new password. Re-type the same
password in the Confirm Password field.3. Click Apply to change the current account settings.
Figure 3.2 Changing a Default Password
Note! To change other user's password, go to Administration > User. From the User Administration menu, click Change Password behind the user's account
WISE-6610 Series User Manual 15
Selecting the General item will open a screen displaying a summary of basicinformation about the device and its activities. This page is also displayed when youlogin to the web interface. Information is divided into several sections, based uponthe type of device activity or the properties area: Mobile Connection, Primary LAN,Peripheral Ports and System Information. If the device is WiFi equipped, there will bea WiFi section.IPv6 Address item can show multiple different addresses for one network interface.This is standard behavior since an IPv6 interface uses more addresses. The secondIPv6 Address showed after pressing More Information is automatically generatedEUI-64 format link local IPv6 address derived from MAC address of the interface. It isgenerated and assigned the first time the interface is used (e.g. cable is connected,Mobile WAN connecting, etc.).To access this page, click Status > General.
Figure 3.3 Status > General
16 WISE-6610 Series User Manual
3.3.2 NetworkTo view information about the interfaces and the routing table, open the Network itemin the Status menu.To access this page, click Status > Network.
Figure 3.4 Status > Network
3.3.3 DHCPInformation about the DHCP server activity is accessible via DHCP item. The DHCPserver provides automatic configuration of the client devices connected to the device.The DHCP server assigns each device an IP address, subnet mask, default gateway(IP address of device) and DNS server (IP address of device). DHCPv6 server issupported.To access this page, click Status > DHCP.
Figure 3.5 Status > DHCP
WISE-6610 Series User Manual 17
Figure 3.6 Status > IPsec
3.3.5 DynDNSThe device supports DynamicDNS using a DNS server on www.dyndns.org. IfDynamic DNS is configured, the status can be displayed by selecting menu optionDynDNS. Refer to www.dyndns.org for more information on how to configure aDynamic DNS client.You can use the following listed servers for the Dynamic DNS service. It is possible touse the DynDNSv6 service with IP Mode switched to IPv6 on DynDNS Configurationpage. www.dyndns.org www.spdns.de www.dnsdynamic.org www.noip.comTo access this page, click Status > DynDNS.
Figure 3.7 Status > DynDNSWhen the device detects a DynDNS record update, the dialog displays one or moreof the following messages: DynDNS client is disabled. Invalid username or password. Specified hostname doesn't exist. Invalid hostname format. Hostname exists, but not under specified username. No update performed yet. DynDNS record is already up to date. DynDNS record successfully update. DNS error encountered. DynDNS server failure.
18 WISE-6610 Series User Manual
3.3.6 System LogIf there are any connection problems you may view the system log by selecting theSystem Log menu item. Detailed reports from individual applications running in thedevice will be displayed. Use the Save Log button to save the system log to aconnected computer. (It will be saved as a text file with the .log extension.) The SaveReport button is used for creating detailed reports. (It will be saved as a text file withthe .txt extension. The file will include statistical data, routing and process tables,system log, and configuration.)The default length of the system log is 1000 lines. After reaching 1000 lines a new fileis created for storing the system log. After completion of 1000 lines in the second file,the first file is overwritten with a new file.The Syslogd program will output the system log. It can be started with two options tomodify its behavior. Option “-S” followed by decimal number sets the maximalnumber of lines in one log file. Option “-R” followed by hostname or IP addressenables logging to a remote syslog daemon. (If the remote syslog daemon is LinuxOS, there has to be remote logging enabled (typically running “syslogd -R”). If it's theWindows OS, there has to be syslog server installed, e.g. Syslog Watcher). To startsyslogd with these options, the “/etc/init.d/syslog” script can be modified via SSH orlines can be added into Startup Script (accessible in Configuration section) accordingto Figure 3.9.To access this page, click Status > System Log.
Figure 3.8 Status > System LogThe following example (figure) shows how to send syslog information to a remoteserver at 192.168.2.115 on startup.
Figure 3.9 Example Program Syslogd Start with the Parameter -R
WISE-6610 Series User Manual 19
To enter the Local Area Network configuration, select the LAN menu item in theConfiguration section.LAN Configuration page is divided into IPv4 and IPv6 columns, see Figure 3.10.There is dual stack support of IPv4 and IPv6 protocols - they can run alongside, youcan configure either one of them or both. If you configure both IPv4 and IPv6, othernetwork devices will choose the communication protocol. Configuration items andIPv6 to IPv4 differences are described in the tables below.
20 WISE-6610 Series User Manual
To access this page, click Configuration > LAN.
Figure 3.10 Configuration > LAN
Item DescriptionDHCP Client Enables/disables the DHCP client function supporting both IPv4 and
IPv6. disabled - The device does not allow automatic allocation of an
IP address from a DHCP server in LAN network. enabled - The device allows automatic allocation of an IP
address from a DHCP server in LAN network.IP Address A fixed IP address of the Ethernet interface. Use IPv4 notation in IPv4
column and IPv6 notation in IPv6 column. Shortened IPv6 notation is supported.
Subnet Mask / Prefix Specifies a Subnet Mask for the IPv4 address. In the IPv6 column, fill in the Prefix for the IPv6 address - number in range 0 to 128.
WISE-6610 Series User Manual 21
The Default Gateway and DNS Server items are only used if the DHCP Client item isset to disabled and if the Primary or Secondary LAN is selected by the BackupRoutes system as the default route. Since FW 5.3.0, Default Gateway and DNSServer are also supported on bridged interfaces.The following items (in the table below) are global for the configured Ethernetinterface. Only one bridge can be active on the device at a time. The DHCP Client, IPAddress and Subnet Mask / Prefix parameters of the only one of the interfaces areused to for the bridge. Primary LAN has higher priority when other interfaces (wlan0)are added to the bridge. Other interfaces (wlan0 - wifi) can be added to or deletedfrom an existing bridge at any time. The bridge can be created on demand for suchinterfaces, but not if it is configured by their respective parameters.
3.4.1.1 DHCP ServerThe DHCP server assigns the IP address, gateway IP address (IP address of thedevice) and IP address of the DNS server (IP address of the device) to the connectedclients. If these values are filled in by the user in the configuration form, they will bepreferred.The DHCP server supports static and dynamic assignment of IP addresses. DynamicDHCP assigns clients IP addresses from a defined address space. Static DHCPassigns IP addresses that correspond to the MAC addresses of connected clients.If IPv6 column is filled in, the DHCPv6 server is used - it is dual stack IPv4 and IPv6.
Default Gateway Specifies the IP address of a default gateway. If filled-in, every packet with the destination not found in the routing table is sent to this IP address. Use proper IP address notation in IPv4 and IPv6 column.
DNS Server Specifies the IP address of the DNS server. When the IP address is not found in the Routing Table, the device forwards the request to DNS server specified here. Use proper IP address notation in IPv4 and IPv6 column.
Item DescriptionBridged Activates/deactivates the bridging function on the device.
no - The bridging function is inactive (default). yes - The bridging function is active.
Media Type Specifies the type of duplex and speed used in the network. Auto-negation - The device automatically sets the best speed
and duplex mode of communication according to the network's possibilities.
100 Mbps Full Duplex - The device communicates at 100 Mbps, in the full duplex mode.
100 Mbps Half Duplex - The device communicates at 100 Mbps, in the half duplex mode.
10 Mbps Full Duplex - The device communicates at 10 Mbps, in the full duplex mode.
10 Mbps Half Duplex - The device communicates at 10 Mbps, in the half duplex mode.
Item Description
Note! Do not to overlap ranges of static allocated IP addresses with addresses allocated by the dynamic DHCP server. IP address conflicts and incorrect network function can occur if you overlap the ranges.
22 WISE-6610 Series User Manual
Configuration of Dynamic DHCP Server
Configuration of Static DHCP Server
3.4.1.2 IPv6 Prefix Delegation
If you want to override the automatic IPv6 prefix delegation, you can configure it inthis form. You have to know your Subnet ID Width (part of IPv6 address), seeFigure 3.11 below for the calculation help - it is an example: 48 bits is Site Prefix, 16bits is Subnet ID (Subnet ID Width) and 64 bits is Interface ID.
Figure 3.11 IPv6 Address with Prefix Example
Item DescriptionEnable dynamic DHCP leases
Select this option to enable a dynamic DHCP server.
IP Pool Start Starting IP addresses allocated to the DHCP clients. Use proper notation in IPv4 and IPv6 column.
IP Pool End End of IP addresses allocated to the DHCP clients. Use proper IP address notation in IPv4 and IPv6 column.
Lease time Time in seconds that the IP address is reserved before it can be re-used.
Item DescriptionEnable static DHCP leases
Select this option to enable a static DHCP server.
MAC Address MAC address of a DHCP client.IPv4 Address Assigned IPv4 address. Use proper notation.IPv6 Address Assigned IPv6 address. Use proper notation.
Note! This is an advanced configuration option. IPv6 prefix delegation works automatically with DHCPv6 - use only if different configuration is desired and if you know the consequences.
Item DescriptionEnable IPv6 prefix delegation
Enables prefix delegation configuration filled-in below.
Enable IPv6 prefix delegation
The decimal value of the Subnet ID of the Ethernet interface. Maximum value depends on the Subnet ID Width.
Subnet ID Width The maximum Subnet ID Width depends on your Site Prefix - it is the remainder to 64 bits.
WISE-6610 Series User Manual 23
The following are LAN configuration illustrations defining possible network topology.Example 1: IPv4 Dynamic DHCP Server, Default Gateway and DNS Server The range of dynamic allocated IPv4 addresses is from 192.168.1.2 to
192.168.1.4. The address is allocated for 600 second (10 minutes). Default gateway IP address is 192.168.1.20 DNS server IP address is 192.168.1.20
Figure 3.12 IPv4 Dynamic DHCP Network Topology
Item DescriptionEnable IEEE 802.1X Authentication
Tick the radio button to enable the authentication function.
Authentication Method
Click the drop-down menu to select the method type. Range: EAP-PEAP/MSCHAPv2 or EAP-TLS.
CA Certificate Enter the trusted digital certificate (required for EAP-PEAP).Local Certificate Enter the self-signed digital certificate (required for EAP-PEAP).Local Private Key Enter the secret key variable used to encrypt or decrypt the
transmission.Identity Enter the Identity profile authorized to access the authentication
server.Password Enter the string associated with the defined Identity profile in the
previous frame.Apply Click Apply to accept the configuration changes.
24 WISE-6610 Series User Manual
The settings required in the LAN configuration menu for an IPv4 Dynamic DHCPconfiguration are shown in the following figure.
Figure 3.13 LAN Configuration for a Dynamic Network TypologyExample 2: IPv4 Dynamic and Static DHCP server The range of allocated addresses is from 192.168.1.2 to 192.168.1.4. The address is allocated for 600 seconds (10 minutes). The client with the MAC address 01:23:45:67:89:ab has the IP address
192.168.1.10. The client with the MAC address 01:54:68:18:ba:7e has the IP address
192.168.1.11.
Figure 3.14 IPv4 Dynamic and Static DHCP Network Topology
WISE-6610 Series User Manual 25
The settings required in the LAN configuration menu for an IPv4 Dynamic and StaticDHCP configuration are shown in the following figure.
Figure 3.15 LAN Configuration for an IPv4 Dynamic and Static DHCP Network Topology
Example 3: IPv6 Dynamic DHCP Server The range of dynamic allocated IPv6 addresses is from 2001:db8::1 to
2001:db8::ffff. The address is allocated for 600 second (10 minutes). The device is still accessible via IPv4 (192.168.1.1).
Figure 3.16 IPv6 Dynamic DHCP Server Network Topology
26 WISE-6610 Series User Manual
Figure 3.17 LAN Configuration for an IPv6 Dynamic DHCP Server Network Topology
WISE-6610 Series User Manual 27
Figure 3.18 Configuration > NATThe router actually uses Port Address Translation (PAT), which is a method of map-ping a TCP/UDP port to another TCP/UDP port. The router modifies the informationin the packet header as the packets traverse a router. This configuration form allowsyou to specify up to 16 PAT rules.
Item DescriptionPublic Port Public port for the translation rule.Private Port Private port for the translation rule.Type Protocol type - TCP or UDP.Server IP Address IP address where the router forwards incoming data.
28 WISE-6610 Series User Manual
If you require more than sixteen NAT rules, insert the remaining rules into the StartupScript. The Startup Script dialog is located on Scripts page in the Configuration sec-tion of the menu. When creating your rules in the Startup Script, use this commandfor IPv4 NAT:
Enter the IP address [IPADDR], the public ports numbers [PORT_PUBLIC], and pri-vate [PORT_PRIVATE] in place of square brackets. For IPv6 NAT use ip6tables com-mand with same options.If you enable the following options and enter the port number, the router allows you toremotely access to the router from WAN (Mobile WAN) interface.
Use the following parameters to set the routing of incoming data from the WAN(Mobile WAN) to a connected computer.
iptables -t nat -A napt -p tcp -dport [PORT_PUBLIC] -j DNAT-to-destination [IPADDR]:[PORT_PRIVATE]
Caution! Enable remote HTTP access on port activates the redirect from HTTP to HTTPS protocol only. The router doesn't allow unsecured HTTP proto-col to access the web configuration. To access the web configuration, always check the Enable re- mote HTTPS access on port item. Never enable the HTTP item only to access the web configuration from the Internet (configuration would not be accessible from the Internet). Always check the HTTPS item or HTTPS and HTTP items together (to set the redirect from HTTP).
Item DescriptionEnable remote HTTP access on port
This option sets the redirect from HTTP to HTTPS only (disabled in default configuration).
Enable remote HTTPS access on port
If field and port number are filled in, configuration of the router over web interface is allowed (disabled in default configuration).
Enable remote SSH access on port
Select this option to allow access to the router using SSH (disabled in default configuration).
Enable remote SNMP access on port
Select this option to allow access to the router using SNMP (disabled in default configuration).
Masquerade outgoing packets
Activates/deactivates the network address translation function.
Item DescriptionSend all remaining incoming packets to default server
Activates/deactivates forwarding unmatched incoming packets to the default server. The prerequisite for the function is that you specify a default server in the De- fault Server IPv4/IPv6 Address field. The router can for- ward incoming data from a GPRS to a computer with the assigned IP address.
Default Server IP Address
The IP address.
WISE-6610 Series User Manual 29
Figure 3.19 Topology for NAT Configuration Example 1It is important to mark the Send all remaining incoming packets to default servercheck box for this configuration. The IP address in this example is the address of thedevice behind the router. The default gateway of the devices in the subnetwork con-nected to router is the same IP address as displayed in the Default Server IPv4Address field.
Figure 3.20 NAT Configuration for Example 1Example 2: IPv4 NAT Configuration with More Equipment ConnectedIn this example, using the switch you can connect more devices behind the router.Every device connected behind the router has its own IP address. Enter the addressin the Server IPv4 Address field in the NAT dialog. The devices are communicatingon port 80, but you can set port forwarding using the Public Port and Private Portfields in the NAT dialog. You have now configured the router to access the192.168.1.2:80 socket behind the router when accessing the IP address 10.0.0.1:81from the Internet. If you send a ping request to the public IP address of the router(10.0.0.1), the router responds as usual (not forwarding). And since the Send all
30 WISE-6610 Series User Manual
remaining incoming packets to default server is inactive, the router denies connectionattempts.
Figure 3.21 Topology for NAT Configuration Example 2
Figure 3.22 NAT Configuration for Example 2
WISE-6610 Series User Manual 31
Figure 3.23 Configuration > OpenVPN > 1st Tunnel
Item DescriptionDescription Specifies the description or name of tunnel.
32 WISE-6610 Series User Manual
Protocol Specifies the communication protocol. UDP - The OpenVPN communicates using UDP. TCP server - The OpenVPN communicates using TCP in server
mode. TCP client - The OpenVPN communicates using TCP in client
mode. UDPv6 - The OpenVPN communicates using UDP over IPv6. TCPv6 server - The OpenVPN communicates using TCP over
IPv6 in server mode. TCPv6 client - The OpenVPN communicates using TCP over
IPv6 in client mode.UDP Port Specifies the port of the relevant protocol (UDP or TCP).Remote IP Address Specifies the IPv4, IPv6 address or domain name of the opposite side
of the tunnel.Remote Subnet IPv4 address of a network behind opposite side of the tunnel.Remote Subnet Mask
IPv4 subnet mask of a network behind opposite tunnel's side.
Redirect Gateway Activates/deactivates redirection of data on Layer 2.Local Interface IP Address
Specifies the IPv4 address of a local interface. For proper routing it is recommended to fill-in any IPv4 address from local range even if you are using IPv6 tunnel only.
Remote Interface IP Address
Specifies the IPv4 address of the interface of opposite side of the tunnel. For proper routing it is recommended to fill-in any IPv4 address from local range even if you are using IPv6 tunnel only.
Remote IPv6 Subnet Specify the subnet associated with the listed remote interface. Remote IPv6 Subnet Prefix Length
IPv6 address and prefix of the remote IPv6 network. Equivalent of the Remote Subnet and Remote Subnet Mask in IPv4 section.
Local Interface IPv6 Address
Specifies the IPv6 address of a local interface.
Remote Interface IPv6 Address
Specifies the IPv6 address of the interface of opposite side of the tunnel.
Ping Interval Specifies the IPv6 address of the interface of opposite side of the tunnel.
Ping Timeout Specifies the time interval the device waits for a message sent by the opposite side. For proper verification of the OpenVPN tunnel, set the Ping Timeout to greater than the Ping Interval.
Renegotiate Interval Specifies the renegotiate period (reauthorization) of the OpenVPN tunnel. You can only set this parameter when the Authenticate Mode is set to username/password or X.509 certificate. After this time period, the device changes the tunnel encryption to help provide the continues safety of the tunnel.
Max Fragment Size Maximum size of a sent packet.Compression Compression of the data sent:
none - No compression is used. LZO - A lossless compression is used, use the same setting on
both sides of the tunnel.NAT Rules Activates/deactivates the NAT rules for the OpenVPN tunnel:
not applied - NAT rules are not applied to the tunnel. applied - NAT rules are applied to the OpenVPN tunnel.
Item Description
WISE-6610 Series User Manual 33
Example: OpenVPN Tunnel Configuration in IPv4 Network
Figure 3.24 Topology of OpenVPN Configuration ExampleOpenVPN tunnel configuration:
Authenticate Mode Specifies the authentication mode: none - No authentication is set. Pre-shared secret - Specifies the shared key function for both
sides of the tunnel. Username/password - Specifies authentication using a CA
Certificate, Username and Password. X.509 Certificate (multiclient) - Activates the X.509
authentication in multi-client mode. X.509 Certificate (client) - Activates the X.509 authentication in
client mode. X.509 Certificate (server) - Activates the X.509 authentication in
server mode.Pre-shared Secret Specifies the pre-shared secret which you can use for every
authentication mode.CA Certificate Specifies the CA Certificate which you can use for the username/
password and X.509 Certificate authentication modes.DH Parameters Specifies the protocol for the DH parameters key exchange which you
can use for X.509 Certificate authentication in the server mode.Local Certificate Specifies the certificate used in the local device. You can use this
authentication certificate for the X.509 Certificate authentication mode.
Local Private Key Specifies the key used in the local device. You can use the key for the X.509 Certificate authentication mode.
Username Specifies a login name which you can use for authentication in the username/password mode.
Password Specifies a password which you can use for authentication in the username/password mode.
Extra Options Specifies additional parameters for the OpenVPN tunnel, such as DHCP options. The parameters are proceeded by two dashes. For possible parameters see the help text in the device using SSH - run the openvpnd --help command.
Configuration A BProtocol UDP UDPUDP Port 1194 1194
Item Description
34 WISE-6610 Series User Manual
Examples of different options for configuration and authentication of OpenVPN tunnelcan be found in the application note OpenVPN Tunnel [5].
3.4.4 IPSecTo open the Tunnel Configuration page, click in the Configuration section of the mainmenu. The tunnel function allows you to create a secured connection between twoseparate LAN networks. The device allows you to create up to four tunnels. IPv4 andIPv6 tunnels are supported (dual stack), you can transport IPv6 traffic through IPv4tunnel and vice versa.To access this page, click Configuration > IPSec.
Remote IP Address 10.0.0.2 10.0.0.1Remote Subnet 192.168.2.0 192.168.1.0Remote Subnet Mask 255.255.255.0 255.255.255.0Local Interface IP Address 19.16.1.0 19.16.2.0Remote Interface IP Address 19.16.2.0 19.16.1.0Compression LZO LZOAuthenticate mode none none
Configuration A B
Note! To encrypt data between the local and remote subnets, specify the appropriate values in the subnet fields on both devices. To encrypt the data stream between the devices only, leave the local and remote subnets fields blank.
Note! If you specify the protocol and port information in the Local Protocol/Port field, then the device encapsulates only the packets matching the settings.
WISE-6610 Series User Manual 35
Figure 3.25 Configuration > 1st Tunnel
36 WISE-6610 Series User Manual
Item DescriptionDescription Name or description of the tunnel.Host IP Mode IPv4 - The device communicates via IPv4 with the opposite side
of the tunnel. IPv6 - The device communicates via IPv4 with the opposite side
of the tunnel.Remote IP Address IPv4, IPv6 address or domain name of the remote side of the tunnel,
based in the Host IP Mode above.Tunnel IP Mode IPv4 - The IPv4 communication runs inside the tunnel.
IPv6 - The IPv6 communication runs inside the tunnel.Remote ID Identifier (ID) of remote side of the tunnel. It consists of two parts: a
hostname and a domain-name.Remote Subnet IPv4 or IPv6 address of a network behind remote side of the tunnel,
based on Tunnel IP Mode above.Remote Subnet Mask
IPv4 subnet mask of a network behind remote side of the tunnel, or IPv6 prefix (single number 0 to 128).
Remote Protocol/Port
Specifies Protocol/Port of remote side of the tunnel. The general form is protocol /port, for example 17/1701 for UDP (protocol 17) and port 1701. It is also possible to enter only the number of protocol, however, the above mentioned format is preferred.
Local ID Identifier (ID) of local side of the tunnel. It consists of two parts: a hostname and a domain-name.
Local Subnet IPv4 or IPv6 address of a local network, based on Tunnel IP Mode above.
First Local Subnet Mask
IPv4 subnet mask of a local network, or IPv6 prefix (single number 0 to 128).
Local Protocol/Port Specifies Protocol/Port of a local network. The general form is protocol /port, for example 17/1701 for UDP (protocol 17) and port 1701. It is also possible to enter only the number of protocol, however, the above mentioned format is preferred.
Encapsulation Mode Specifies the mode, according to the method of encapsulation. You can select the tunnel mode in which the entire IP datagram is encapsulated or the transport mode in which only IP header is encapsulated.
Force NAT Traversal Enable/disables NAT address translation on the tunnel. Enable if you use NAT between the end points of the tunnel.
IKE Protocol Click the drop-down menu to select to define a protocol (IKEv1/IKEv2, IKEv1, or IKEv2). IKE Phase 1 is ISAKMP (Internet Security Association and Key Management Protocol), which is used to create private tunnelling between peers for a secure communication.
IKE Mode Specifies the mode for establishing a connection (main or aggressive). If you select the aggressive mode, then the device establishes the tunnel faster, but the encryption is permanently set to 3DES-MD5. We recommend that you not use the aggressive mode due to lower security!
IKE Algorithm Specifies the means by which the device selects the algorithm: auto - The encryption and hash algorithm are selected
automatically. manual - The encryption and hash algorithm are defined by the
user.IKE Encryption Encryption algorithm - 3DES, AES128, AES192, AES256.IKE Hash Hash algorithm - MD5, SHA1, SHA256, SHA384 or SHA512.
WISE-6610 Series User Manual 37
The function supports the following types of identifiers (ID) for both sides of thetunnel, Remote ID and Local ID parameters: IP address (for example, 192.168.1.1) DN (for example, C=CZ, O=CompanyName, OU=TP, CN=A) FQDN (for example, @director.companyname.cz) - the @ symbol proceeds the
FQDN. User FQDN (for example, [email protected])The certificates and private keys have to be in the PEM format. Use only certificatescontaining start and stop tags.The random time, after which the device re-exchanges new keys is defined asfollows:
IKE DH Group Specifies the Diffie-Hellman groups which determine the strength of the key used in the key exchange process. Higher group numbers are more secure, but require more time to compute the key.
ESP Algorithm Specifies the means by which the device selects the algorithm: auto - The encryption and hash algorithm are selected
automatically. manual - The encryption and hash algorithm are defined by the
user.ESP Encryption Encryption algorithm - DES, 3DES, AES128, AES192, AES256.ESP Hash Hash algorithm - MD5, SHA1, SHA256, SHA384 or SHA512.PFS Enables/disables the Perfect Forward Secrecy function. The function
ensures that derived session keys are not compromised if one of the private keys is compromised in the future.
PFS DH Group Specifies the Diffie-Hellman group number (see IKE DH Group).Key Lifetime Lifetime key data part of tunnel. The minimum value of this parameter
is 60 s. The maximum value is 86400 s.IKE Lifetime Lifetime key service part of tunnel. The minimum value of this
parameter is 60 s. The maximum value is 86400 s.Rekey Margin Specifies how long before a connection expires that the device
attempts to negotiate a replacement. Specify a maximum value that is less than half of IKE and Key Lifetime parameters.
Rekey Fuzz Percentage of time for the Rekey Margin extension.DPD Delay Time after which the tunnel functionality is tested.DPD Timeout The period during which device waits for a response.Authenticate Mode Specifies the means by which the device authenticates:
Pre-shared key - Sets the shared key for both sides of the tunnel.
X.509 Certificate - Allows X.509 authentication in multiclient mode.
Pre-shared Key Specifies the shared key for both sides of the tunnel. The prerequisite for entering a key is that you select pre-shared key as the authentication mode.
CA Certificate Certificate for X.509 authentication.Remote Certificate Certificate for X.509 authentication.Local Certificate Certificate for X.509 authentication.Local Private Key Private key for X.509 authentication.Local Passphrase Passphrase used during private key generation.Debug Choose the level of verbosity to System Log. Silent (default), audit,
control, control-more, raw, private (most verbose including the private keys). See strongSwan documentation for more details.
Item Description
38 WISE-6610 Series User Manual
Lifetime - (Rekey margin + random value in range (from 0 to Rekey margin *Rekey Fuzz/100))
The default exchange of keys is in the following time range: Minimal time: 1h - (9m + 9m) = 42m Maximal time: 1h - (9m + 0m) = 51mWe recommend that you maintain the default settings. When you set key exchangetimes higher, the tunnel produces lower operating costs, but the setting also providesless security. Conversely, when you reducing the time, the tunnel produces higheroperating costs, but provides for higher security.The changes in settings will apply after clicking the Apply button.Example: Tunnel Configuration in IPv4 Network
Figure 3.26 Topology of Configuration Example tunnel configuration:
Examples of different options for configuration and authentication of tunnel can befound in the application note Tunnel [6].
3.4.5 GRE
To open the GRE Tunnel Configuration page, click GRE in the Configuration sectionof the main menu. The GRE tunnel function allows you to create an unencrypted
Configuration A BHost IP Mode IPv4 IPv4Remote IP Address 10.0.0.2 10.0.0.1Tunnel IP Mode IPv4 IPv4Remote Subnet 192.168.2.0 192.168.1.0Remote Subnet Mask 255.255.255.0 255.255.255.0Local Subnet 192.168.1.0 192.168.2.0Local Subnet Mask 255.255.255.0 255.255.255.0Authenticate mode pre-shared key pre-shared keyPre-shared key test test
Note! GRE is an unencrypted protocol. GRE via IPv6 is not supported.
WISE-6610 Series User Manual 39
connection between two separate LAN networks. The device allows you to createfour GRE tunnels.To access this page, click Configuration > GRE.
Figure 3.27 Configuration > GRE > 1st Tunnel
The changes in settings will apply after pressing the Apply button.
Item DescriptionDescription Description of the GRE tunnel.Remote IP Address IP address of the remote side of the tunnel.Remote Subnet IP address of the network behind the remote side of the tunnel.Remote Subnet Mask
Specifies the mask of the network behind the remote side of the tunnel.
Local Interface IP Address
IP address of the local side of the tunnel.
Remote Interface IP Address
IP address of the remote side of the tunnel.
Multicasts Activates/deactivates sending multicast into the GRE tunnel: disabled - Sending multicast into the tunnel is inactive. enabled - Sending multicast into the tunnel is active.
Pre-shared Key Specifies an optional value for the 32 bit shared key in numeric format, with this key the device sends the filtered data through the tunnel. Specify the same key on both devices, otherwise the device drops received packets.
Note! The GRE tunnel does not pass through NAT.
40 WISE-6610 Series User Manual
Example: GRE Tunnel Configuration
Figure 3.28 Topology of GRE Tunnel Configuration ExampleGRE tunnel configuration:
Examples of different options for configuration of GRE tunnel can be found in theapplication note GRE Tunnel [7].
3.4.6 L2TP
To open the L2TP Tunnel Configuration page, click L2TP in the Configuration sectionof the main menu. The L2TP tunnel function allows you to create a passwordprotected connection between 2 LAN networks. The device activates the tunnelsafter you mark the Create L2TP tunnel check box.
Configuration A BRemote IP Address 10.0.0.2 10.0.0.1Remote Subnet 192.168.2.0 192.168.1.0Remote Subnet Mask 255.255.255.0 255.255.255.0
Note! L2TP is an unencrypted protocol. L2TP via IPv6 is not supported.
WISE-6610 Series User Manual 41
To access this page, click Configuration > L2TP.
Figure 3.29 Configuration > L2TP
Example: L2TP Tunnel Configuration
Figure 3.30 Topology of L2TP Tunnel Configuration Example
Item DescriptionMode Specifies the L2TP tunnel mode on the device side:
L2TP server - Specify an IP address range offered by the server. L2TP client - Specify the IP address of the server.
Server IP Address IP address of the server.Client Start IP Address
IP address to start with in the address range. The range is offered by the server to the clients.
Client End IP Address
The last IP address in the address range. The range is offered by the server to the clients.
Local IP Address IP address of the local side of the tunnel.Remote IP Address IP address of the remote side of the tunnel.Remote Subnet Address of the network behind the remote side of the tunnel.Remote Subnet Mask
The mask of the network behind the remote side of the tunnel.
Username Username for the L2TP tunnel login.Password Password for the L2TP tunnel login.
42 WISE-6610 Series User Manual
Configuration of the L2TP tunnel:
3.4.7 PPTP
Select the PPTP item in the menu to configure a PPTP tunnel. PPTP tunnel allowspassword protected connections between two LANs. It is similar to L2TP. The tunnelsare active after selecting Create PPTP tunnel.To access this page, click Configuration > PPTP.
Figure 3.31 Configuration > PPTP
Configuration A BMode L2TP Server L2TP ClientServer IP Address N/A 10.0.0.1Client Start IP Address 192.168.2.5 N/AClient End IP Address 192.168.2.254 N/ALocal IP Address 192.168.1.1 N/ARemote IP Address N/A N/ARemote Subnet 192.168.2.0 192.168.1.0Remote Subnet Mask 255.255.255.0 255.255.255.0Username username usernamePassword password password
Note! PPTP is an unencrypted protocol. PPTP via IPv6 is not supported.
Item DescriptionMode Specifies the L2TP tunnel mode on the device side:
PPTP server - Specify an IP address range offered by the server.
PPTP client - Specify the IP address of the server.Server IP Address IP address of the server.Local IP Address IP address of the local side of the tunnel.Remote IP Address IP address of the remote side of the tunnel.Remote Subnet Address of the network behind the remote side of the tunnel.Remote Subnet Mask
The mask of the network behind the remote side of the tunnel.
WISE-6610 Series User Manual 43
The changes in settings will apply after pressing the Apply button.The firmware also supports PPTP pass through, which means that it is possible tocreate a tunnel through the device.Example: PPTP Tunnel Configuration
Figure 3.32 Topology of PPTP Tunnel Configuration ExampleConfiguration of the PPTP tunnel:
3.4.8 Services
3.4.8.1 DynDNSThe DynDNS function allows you to access the device remotely using an easy toremember custom hostname. This DynDNS client monitors the IP address of thedevice and updates the address whenever it changes. In order for DynDNS tofunction, you require a public IP address, either static or dynamic, and an activeRemote Access service account at www.dyndns.org. Register the custom domain(third-level) and account information specified in the configuration form. You can useother services, too - see the table below, Server item. To open the DynDNSConfiguration page, click DynDNS in the main menu.
Username Username for the PPTP tunnel login.Password Password for the PPTP tunnel login.
Configuration A BMode PPTP Server PPTP ClientServer IP Address N/A 10.0.0.1Local IP Address 192.168.1.1 N/ARemote IP Address 192.168.2.1 N/ARemote Subnet 192.168.2.0 192.168.1.0Remote Subnet Mask 255.255.255.0 255.255.255.0Username username usernamePassword password password
Item Description
44 WISE-6610 Series User Manual
To access this page, click Configuration > Services > DynDNS.
Figure 3.33 Configuration > Services > DynDNS
Example: DynDNS client configuration with the domain company.dyndns.org:
Figure 3.34 DynDNS Configuration Example
Item DescriptionHostname The third order domain registered on the www.dyndns.org server.Username Username for logging into the DynDNS server.Password Password for logging into the DynDNS server.IP Mode Specifies a DynDNS service other than the www.dyndns.org. Possible
other services: www.spdns.de, www.dnsdynamic.org, www.noip.com.Enter the update server service information in this field. If you leave this field blank, the default server members.dyndns.org will be used.
Server Specifies the version of IP protocol: IPv4 - IPv4 protocol is used only (default). IPv6 - IPv6 protocol is used only. IPv4/IPv6 - IPv4 and IPv6 dual stack is enabled.
WISE-6610 Series User Manual 45
Figure 3.35 Configuration > Services > HTTP
3.4.8.3 NTPThe NTP configuration form allows you to configure the NTP client. To open the NTPpage, click NTP in the Configuration section of the main menu. NTP (Network TimeProtocol) allows you to periodically set the internal clock of the device. The time is setfrom servers that provide the exact time to network devices. IPv6 Time Servers aresupported. If you mark the Enable local NTP service check box, then the device acts as a
NTP server for other devices in the local network (LAN). If you mark the Synchronize clock with NTP server check box, then the device
acts as a NTP client. This means that the device automatically adjusts the internal clock every 24 hours.
To access this page, click Configuration > Services > NTP.
Figure 3.36 Configuration > Services > NTP
Item DescriptionEnable HTTP service Click the check box to set up Ethernet encapsulation (remote access)
through HTTP function.Enable HTTPS service
Click the check box to set up Ethernet encapsulation over HTTPS.
Session Timeout Enter the variable in minutes to define the timeout period for the session.
Apply Click Apply to save the values.
Item DescriptionPrimary NTP Server IPv4 address, IPv6 address or domain name of primary NTP server.Secondary NTP Server
IPv4 address, IPv6 address or domain name of secondary NTP server.
Timezone Specifies the time zone where you installed the device.Daylight Saving Time Activates/deactivates the DST shift.
No - The time shift is inactive. Yes - The time shift is active.
46 WISE-6610 Series User Manual
The figure below displays an example of a NTP configuration with the primary serverset to ntp.cesnet.cz and the secondary server set to tik.cesnet.cz and with theautomatic change for daylight saving time enabled.
Figure 3.37 Example of NTP Configuration
3.4.8.4 SNMPThe SNMP page allows you to configure the SNMP v1/v2 or v3 agent which sendsinformation about the device (and its expansion ports) to a management station. Toopen the SNMP page, click SNMP in the Configuration section of the main menu.SNMP (Simple Network Management Protocol) provides status information about thenetwork elements such as devices or endpoint computers. In the version v3, thecommunication is secured (encrypted). To enable the SNMP service, mark theEnable the SNMP agent check box. Sending SNMP traps to IPv6 address issupported.To access this page, click Configuration > Services > SNMP.
Figure 3.38 Configuration > Services > SNMP
Item DescriptionName Designation of the device.
WISE-6610 Series User Manual 47
To enable the SNMPv1/v2 function, mark the Enable SNMPv1/v2 access check box.It is also necessary to specify a password for access to the Community SNMP agent.The default setting is public.You can define a different password for the Read community (read only) and theWrite community (read and write) for SNMPv1/v2. You can also define 2 SNMP usersfor SNMPv3. You can define a user as read only (Read), and another as read andwrite (Write). The device allows you to configure the parameters in the following tablefor every user separately. The device uses the parameters for SNMP access only.To enable the SNMPv3 function, mark the Enable SNMPv3 access check box, thenspecify the following parameters:
Activating the Enable I/O extension function allows you monitor the binary I/O inputson the device.Selecting Enable M-BUS extension and entering the Baudrate, Parity and Stop Bitslets you monitor the meter status connected to the expansion port MBUS status.Selecting Enable reporting to supervisory system and entering the IP Address andPeriod lets you send statistical information to the monitoring system, R-SeeNet.
Each monitored value is uniquely identified using a numerical identifier OID - ObjectIdentifier. This identifier consists of a progression of numbers separated by a point.The shape of each OID is determined by the identifier value of the parent elementand then this value is complemented by a point and current number. So it is obvious
Location Location of where you installed the device.Contact Person who manages the device together with information how to
contact this person.
Item DescriptionUsername User nameAuthentication Encryption algorithm on the Authentication Protocol that is used to
verify the identity of the users.Authentication Password
Password used to generate the key used for authentication.
Privacy Encryption algorithm on the Privacy Protocol that is used to ensure confidentiality of data.
Privacy Password Password for encryption on the Privacy Protocol.
Item DescriptionIP Address IPv4 or IPv6 address.Period Period of sending statistical information (in minutes).
Item Description
48 WISE-6610 Series User Manual
that there is a tree structure. The following figure displays the basic tree structure thatis used for creating the OIDs.
Figure 3.39 OID Basic StructureThe SNMP values that are specific for Conel devices create the tree starting at OID =.1.3.6.1.4.1.30140. You interpret the OID in the following manner:
iso.org.dod.intern